Sciweavers

10670 search results - page 15 / 2134
» Required Information Release
Sort
View
WWW
2003
ACM
15 years 10 months ago
Revealing Web User Requirements through e-Prototyping
Web Engineering projects face problems when it comes to reveal the Web users' requirements. This is due to the fact that users ? the clients of a Web application ? have diffi...
Martti Jeenicke, Wolf-Gideon Bleek, Ralf Klischews...
HOTOS
2003
IEEE
15 years 2 months ago
Privacy-Aware Location Sensor Networks
Advances in sensor networking and location tracking technology enable location-based applications but they also create significant privacy risks. Privacy is typically addressed t...
Marco Gruteser, Graham Schelle, Ashish Jain, Richa...
PLDI
2006
ACM
15 years 3 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober
EDBT
2004
ACM
139views Database» more  EDBT 2004»
15 years 9 months ago
GRIDS, Databases, and Information Systems Engineering Research
GRID technology, emerging in the late nineties, has evolved from a metacomputing architecture towards a pervasive computation and information utility. However, the architectural de...
Keith G. Jeffery
EUROCRYPT
2004
Springer
15 years 2 months ago
Concurrent Signatures
We introduce the concept of concurrent signatures. These allow two entities to produce two signatures in such a way that, from the point of view of any third party, both signatures...
Liqun Chen, Caroline Kudla, Kenneth G. Paterson